{"id":"https://openalex.org/W2131862251","doi":"https://doi.org/10.1007/978-3-540-73814-5_18","title":"Constraints Solution for Time Sensitive Security Protocols","display_name":"Constraints Solution for Time Sensitive Security Protocols","publication_year":2007,"publication_date":"2007-09-01","ids":{"openalex":"https://openalex.org/W2131862251","doi":"https://doi.org/10.1007/978-3-540-73814-5_18","mag":"2131862251"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-73814-5_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73814-5_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036786337","display_name":"Zhoujun Li","orcid":"https://orcid.org/0000-0002-9603-9713"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhoujun Li","raw_affiliation_strings":["School of Computer Science, National University of Defence Technology, Changsha, 410073, China","School of Computer, BeiHang University, Beijing, 100083, China","School of Computer Science, National University of Defence Technology, Changsha, China and School of Computer, BeiHang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defence Technology, Changsha, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"School of Computer, BeiHang University, Beijing, 100083, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Computer Science, National University of Defence Technology, Changsha, China and School of Computer, BeiHang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054469112","display_name":"Ti Zhou","orcid":"https://orcid.org/0000-0001-8517-5405"},"institutions":[{"id":"https://openalex.org/I96415178","display_name":"University of Defence","ror":"https://ror.org/04arkmn57","country_code":"CZ","type":"education","lineage":["https://openalex.org/I96415178"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN","CZ"],"is_corresponding":false,"raw_author_name":"Ti Zhou","raw_affiliation_strings":["School of Computer Science, National University of Defence Technology, Changsha, 410073, China","[School of Computer Science, National University of Defence Technology, Changsha, China]"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defence Technology, Changsha, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"[School of Computer Science, National University of Defence Technology, Changsha, China]","institution_ids":["https://openalex.org/I96415178"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100621781","display_name":"Mengjun Li","orcid":"https://orcid.org/0000-0002-4197-3736"},"institutions":[{"id":"https://openalex.org/I96415178","display_name":"University of Defence","ror":"https://ror.org/04arkmn57","country_code":"CZ","type":"education","lineage":["https://openalex.org/I96415178"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN","CZ"],"is_corresponding":false,"raw_author_name":"Mengjun Li","raw_affiliation_strings":["School of Computer Science, National University of Defence Technology, Changsha, 410073, China","[School of Computer Science, National University of Defence Technology, Changsha, China]"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defence Technology, Changsha, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"[School of Computer Science, National University of Defence Technology, Changsha, China]","institution_ids":["https://openalex.org/I96415178"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111665765","display_name":"Huowang Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]},{"id":"https://openalex.org/I96415178","display_name":"University of Defence","ror":"https://ror.org/04arkmn57","country_code":"CZ","type":"education","lineage":["https://openalex.org/I96415178"]}],"countries":["CN","CZ"],"is_corresponding":false,"raw_author_name":"Huowang Chen","raw_affiliation_strings":["School of Computer Science, National University of Defence Technology, Changsha, 410073, China","[School of Computer Science, National University of Defence Technology, Changsha, China]"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, National University of Defence Technology, Changsha, 410073, China","institution_ids":["https://openalex.org/I170215575"]},{"raw_affiliation_string":"[School of Computer Science, National University of Defence Technology, Changsha, China]","institution_ids":["https://openalex.org/I96415178"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5036786337"],"corresponding_institution_ids":["https://openalex.org/I170215575","https://openalex.org/I82880672"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.8344,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76613214,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"191","last_page":"203"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7809278964996338},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6703453063964844},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5682312250137329},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.49868345260620117},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4680580496788025},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24305468797683716},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.0968250036239624}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7809278964996338},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6703453063964844},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5682312250137329},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.49868345260620117},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4680580496788025},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24305468797683716},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.0968250036239624},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-73814-5_18","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-73814-5_18","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.41999998688697815,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W98341663","https://openalex.org/W1226580021","https://openalex.org/W1497640022","https://openalex.org/W1506076603","https://openalex.org/W1556566737","https://openalex.org/W1584984507","https://openalex.org/W1589312904","https://openalex.org/W1963547452","https://openalex.org/W2000472767","https://openalex.org/W2016927062","https://openalex.org/W2019609597","https://openalex.org/W2110601905","https://openalex.org/W2114189125","https://openalex.org/W2138769968","https://openalex.org/W2140665129","https://openalex.org/W2145415641","https://openalex.org/W2155319047","https://openalex.org/W2159256409","https://openalex.org/W2170718011","https://openalex.org/W2354768552","https://openalex.org/W2386993063","https://openalex.org/W2620826145","https://openalex.org/W2984332733","https://openalex.org/W3021024949","https://openalex.org/W3145128584","https://openalex.org/W4210727445","https://openalex.org/W4285719527","https://openalex.org/W4301808069"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2282990539"],"abstract_inverted_index":null,"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
